CASIA OpenIR

浏览/检索结果: 共43条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Computational Experiments for Complex Social Systems: Integrated Design of Experiment System 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1175-1189
作者:  Xiao Xue;  Xiangning Yu;  Deyu Zhou;  Xiao Wang;  Chongke Bi;  Shufang Wang;  Fei-Yue Wang
Adobe PDF(11890Kb)  |  收藏  |  浏览/下载:32/4  |  提交时间:2024/04/10
Artificial society  computational experiments  model integration  operation engine  technology integration  
Evolutionary Optimization Methods for High-Dimensional Expensive Problems: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1092-1105
作者:  MengChu Zhou;  Meiji Cui;  Dian Xu;  Shuwei Zhu;  Ziyan Zhao;  Abdullah Abusorrah
Adobe PDF(2100Kb)  |  收藏  |  浏览/下载:19/3  |  提交时间:2024/04/10
Evolutionary algorithm (EA)  high-dimensional expensive problems (HEPs)  industrial applications  surrogate-assisted optimization  
Computational Experiments for Complex Social Systems: Experiment Design and Generative Explanation 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 1022-1038
作者:  Xiao Xue;  Deyu Zhou;  Xiangning Yu;  Gang Wang;  Juanjuan Li;  Xia Xie;  Lizhen Cui;  Fei-Yue Wang
Adobe PDF(7239Kb)  |  收藏  |  浏览/下载:37/8  |  提交时间:2024/03/18
Agent-based modeling  computational experiments  cyber-physical-social systems (CPSS)  generative deduction  generative experiments  meta model  
Reinforcement Learning in Process Industries: Review and Perspective 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 283-300
作者:  Oguzhan Dogru;  Junyao Xie;  Om Prakash;  Ranjith Chiplunkar;  Jansen Soesanto;  Hongtian Chen;  Kirubakaran Velswamy;  Fadi Ibrahim;  Biao Huang
Adobe PDF(1275Kb)  |  收藏  |  浏览/下载:44/15  |  提交时间:2024/01/23
Process control  process systems engineering  reinforcement learning  
Control Strategies for Digital Twin Systems 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 170-180
作者:  Guo-Ping Liu
Adobe PDF(1689Kb)  |  收藏  |  浏览/下载:182/119  |  提交时间:2024/01/02
Digital twin control systems  fault tolerant control  model tracking  performance prediction  performance retention  
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:  Qingsong Zhao;  Lei Shu;  Kailiang Li;  Mohamed Amine Ferrag;  Ximeng Liu;  Yanbin Li
Adobe PDF(3374Kb)  |  收藏  |  浏览/下载:235/170  |  提交时间:2024/01/02
Challenges  Internet of Things (IoT)  privacy and security  security requirements  solar insecticidal lamps (SIL)  
Multi-Blockchain Based Data Trading Markets With Novel Pricing Mechanisms 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 12, 页码: 2222-2232
作者:  Juanjuan Li;  Junqing Li;  Xiao Wang;  Rui Qin;  Yong Yuan;  Fei-Yue Wang
Adobe PDF(2004Kb)  |  收藏  |  浏览/下载:173/75  |  提交时间:2023/10/31
Auction  data trading markets  multi-blockchain  pricing mechanisms  
Can Digital Intelligence and Cyber-Physical-Social Systems Achieve Global Food Security and Sustainability? 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 11, 页码: 2070-2080
作者:  Yanfen Wang;  Mengzhen Kang;  Yali Liu;  Juanjuan Li;  Kai Xue;  Xiujuan Wang;  Jianqing Du;  Yonglin Tian;  Qinghua Ni;  Fei-Yue Wang
Adobe PDF(9632Kb)  |  收藏  |  浏览/下载:207/115  |  提交时间:2023/09/22
Carbon-water balance  decision-support  digital intelligence (DI)  foundation models  planning  
MPC-Based Change Management of Supply Chain Under Disruption Risks: The Case of Battery Industry 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 9, 页码: 1896-1898
作者:  Yi Yang;  Chen Peng
Adobe PDF(1339Kb)  |  收藏  |  浏览/下载:57/15  |  提交时间:2023/08/10
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:107/24  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay